default search action
>ISPA/BDCloud/SocialCom/SustainCom 2021: New York City, NY, USA
- 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021. IEEE 2021, ISBN 978-1-6654-3574-1
- Siqing Fu, Tiejun Li, Jianmin Zhang, Sheng Ma, Sheng Liu:
MiniMCTAD: Minimalist Monte Carlo Transport Architecture Design. 1-10 - Xuan Li, Liqiong Chang, Xue Liu:
CE-Dedup: Cost-Effective Convolutional Neural Nets Training based on Image Deduplication. 11-18 - Aijuan Qian, Chenlu Li, Xiaoju Dong, Shengtao Chen, Yanling Zhang, Guoqiang Li:
SLAMVis: An Interactive Visualization Approach for Smart Labeling on Multidimensional Data. 19-26 - Ling Xiao, Beiji Zou, Chengzhang Zhu, Meng Zeng, Zhi Chen:
HFBT: An Efficient Hierarchical Fault-tolerant Method for Cloud Storage System. 27-36 - Xin Lu, Zhijun Wu:
ATMCC: Design of the Integration Architecture of Cloud Computing and Blockchain for Air Traffic Management. 37-43 - Xiao Huang, Yu Jiang, Hao Fan, Huayun Tang, Yiping Wang, Jin Jin, Hai Wan, Xibin Zhao:
TATA: Throughput-Aware TAsk Placement in Heterogeneous Stream Processing with Deep Reinforcement Learning. 44-54 - Yi Xu, Zhenyi Chen, Binhong Huang, Ximeng Liu, Chen Dong:
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans. 55-62 - Chun Liu, Lin Yang, LinRu Ma, LiuCheng Shi, Xuexian Hu, Weipeng Cao, JingJing Zhang:
PEBIID: Privacy-preserving and Efficient Biometric Identification for IoV DApp. 63-72 - Feiyang Wu, Zhuoran Song, Jing Ke, Li Jiang, Naifeng Jing, Xiaoyao Liang:
PIPArch: Programmable Image Processing Architecture Using Sliding Array. 73-80 - Saqing Yang, Yi Ren, Jianfeng Zhang, Jianbo Guan, Bao Li:
KubeHICE: Performance-aware Container Orchestration on Heterogeneous-ISA Architectures in Cloud-Edge Platforms. 81-91 - Xiaohui Wei, Changbao Zhou, Yong Sheng, Yan Wu, Lina Li, Shang Gao:
RLConfig: Run-time Configuration of Cluster Schedulers via Deep Reinforcement Learning. 92-99 - Xiaohui Wei, Yong Sheng, Lina Li, Changbao Zhou:
DRL-Deploy: Adaptive Service Function Chains Deployment with Deep Reinforcement Learning. 100-107 - Xiaorui Zhu, Lei Gong, Zongwei Zhu, Xuehai Zhou:
Vapor: A GPU Sharing Scheduler with Communication and Computation Pipeline for Distributed Deep Learning. 108-116 - Kunli Lin, Haojun Xia, Kun Zhang, Bibo Tu:
AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level. 117-124 - Penghao Sun, Dongliang Xue, Litong You, Yan Yan, Linpeng Huang:
HyperKV: A High Performance Concurrent Key-Value Store for Persistent Memory. 125-134 - Yihuan Qian, Songwen Pei, Jihong Yuan, Dianle Zhou, Tong Liu, Linghe Kong:
DRAM: Dragonfly Routing Algorithm on Multi-objects by Optimal Thresholds. 135-142 - Ming Xu, Luoyi Zhang, Baoming Zhang, Meng Cao, Jinliang Yuan, Chongjun Wang:
EPINE: Enhanced Proximity Information Network Embedding. 143-150 - Libo Chang, Shengbing Zhang, Huimin Du, Shiyu Wang, Meikang Qiu, Jihe Wang:
Accuracy vs. Efficiency: Achieving both Through Hardware-Aware Quantization and Reconfigurable Architecture with Mixed Precision. 151-158 - Chendi Li, Haipeng Jia, Hang Cao, Jianyu Yao, Boqian Shi, Chunyang Xiang, Jinbo Sun, Pengqi Lu, Yunquan Zhang:
AutoTSMM: An Auto-tuning Framework for Building High-Performance Tall-and-Skinny Matrix-Matrix Multiplication on CPUs. 159-166 - Jia Ma, Xianqi Zheng, Yubo Liu, Zhiguang Chen:
KBP: Mining Block Access Pattern for I/O Prediction with K-Truss. 167-176 - Yinglong Xiong, Jiang Zhou, Lin Su, Weiping Wang, Yong Chen:
ECCH: Erasure Coded Consistent Hashing for Distributed Storage Systems. 177-184 - Zhihao Liu, Qiang Wang, Yongjian Li, Yongxin Zhao:
CMSS: Collaborative Modeling of Safety and Security Requirements for Network Protocols. 185-192 - Baoke Li, Cong Cao, Yuhai Lu, Yanbing Liu, Baohui Li, Binxing Fang, Jianhui Fu:
D2Graph: An Efficient and Unified Out-of-Core Graph Computing Model. 193-201 - Milan M. Shetti, Bingzhe Li, David H. C. Du:
E-VM: An Elastic Virtual Machine Scheduling Algorithm to Minimize the Total Cost of Ownership in a Hybrid Cloud. 202-211 - Ke Ren, Peng Jiang, Liehuang Zhu, Keke Gai:
SM9-based Anonymous Search over Encrypted Data. 212-219 - Xin Huang, Guozheng Wang, Yongmei Lei:
GR-ADMM: A Communication Efficient Algorithm Based on ADMM. 220-227 - Moming Duan, Duo Liu, Xinyuan Ji, Renping Liu, Liang Liang, Xianzhang Chen, Yujuan Tan:
FedGroup: Efficient Federated Learning via Decomposed Similarity-Based Clustering. 228-237 - Renjie Zhou, Dezun Dong, Shan Huang, Yang Bai:
FastTune: Timely and Precise Congestion Control in Data Center Network. 238-245 - Chunhua Xiao, Dandan Xu, Shi Qiu, Chen Shi, Kun Ning:
FGPA: Fine-Grained Pipelined Acceleration for Depthwise Separable CNN in Resource Constraint Scenarios. 246-254 - Junchao Ma, Dezun Dong, Cunlu Li, Ke Wu, Liquan Xiao:
PAARD: Proximity-Aware All-Reduce Communication for Dragonfly Networks. 255-262 - Lanju Kong, Yaming Dou, Qingqing Yin, Xinping Min, Qingzhong Li:
WST+iMPT: A High-performance Incremental Verification World State Model for Massive Accounts. 263-270 - Penghao Zhang, Heng Pan, Zhenyu Li, Gaogang Xie, Penglai Cui:
NetANNS: A High-Performance Distributed Search Framework Based On In-Network Computing. 271-278 - Lizhi Zhang, Zhiquan Lai, Yu Tang, Dongsheng Li, Feng Liu, Xiaochun Luo:
PCGraph: Accelerating GNN Inference on Large Graphs via Partition Caching. 279-287 - Zhen Xu, Wenbo Zhang:
QuickCDC: A Quick Content Defined Chunking Algorithm Based on Jumping and Dynamically Adjusting Mask Bits. 288-299 - Xinmeng Li, Nengguang Luo, Dan Tang, Zhiqing Zheng, Zheng Qin, Xinxiang Gao:
BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural Network. 300-307 - Ziyue Xu, Lixiao Cui, Gang Wang, Xiaoguang Liu:
Alter: Towards Optimizing Persistent Indexes in Hybrid Memory Systems. 308-315 - Jiaming Huang, Chuming Xiao, Weigang Wu, Ye Yin, Hongli Chang:
MADC: Multi-scale Attention-based Deep Clustering for Workload Prediction. 316-323 - Yuzhao Wang, Junqing Yu, Zhibin Yu:
Treator: a Fast Centralized Cluster Scheduling at Scale Based on B+ Tree and BSP. 324-335 - Tao Zhong, Junsheng Chang, Peichang Shi, Linhui Li, Fei Gao:
Dyacon: JointCloud Dynamic Access Control Model of Data Security Based on Verifiable Credentials. 336-343 - Li Lin, Shuang Li, Xuhui Lv, Bo Li:
BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments. 344-351 - Shuai Ding, Daoqing Zhang, Jingguo Ge, Xiaowei Yuan, Xinhui Du:
Encrypt DNS Traffic: Automated Feature Learning Method for Detecting DNS Tunnels. 352-359 - Shuyue Ma, Shudian Song, Lingyu Yang, Jingmei Zhao, Feng Yang, Linbo Zhai:
IMOPSOQ: Offloading Dependent Tasks in Multi-access Edge Computing. 360-367 - Xinxuan Huang, Jigang Wu, Jiaxing Li, Chengpeng Xia:
BEADS: Blockchain-Empowered Auction in Decentralized Storage. 368-373 - Qizhen Xu, Zhijie Zhang, Lin Zhang, Liwei Chen, Gang Shi:
Finding Runtime Usable Gadgets: On the Security of Return Address Authentication. 374-381 - Xiaobo Guo, Fali Wang, Neng Gao, Zeyi Liu, Kai Liu:
ConvMB: Improving Convolution-Based Knowledge Graph Embeddings by Adopting Multi-Branch 3D Convolution Filters. 382-389 - Xiu Ma, Guangli Li, Lei Liu, Huaxiao Liu, Lei Liu, Xiaobing Feng:
Understanding the Runtime Overheads of Deep Learning Inference on Edge Devices. 390-397 - Jiaquan Yan, Yalan Wu, Jigang Wu, Long Chen:
Parameter Servers Placement for Distributed Deep Learning in Edge computing. 398-404 - Haiyang Lin, Mingyu Yan, Duo Wang, Wenming Li, Xiaochun Ye, Zhimin Tang, Dongrui Fan:
Alleviating Imbalance in Synchronous Distributed Training of Deep Neural Networks. 405-412 - Bin Dai, Tao Ren, Jianwei Niu, Zheyuan Hu, Shucheng Hu, Meikang Qiu:
A Distributed Computation Offloading Scheduling Framework based on Deep Reinforcement Learning. 413-420 - Shiqin Liu, Shiyuan Feng, Jinxia Wu, Wei Ren, Weiqi Wang, Wenwen Zheng:
Exploration of the Influence on Training Deep Learning Models by Watermarked Image Dataset. 421-428 - Zhiyi Gui, Xiang Yang, Hao Yang, Wei Li, Lei Zhang, Qi Qi, Jingyu Wang, Haifeng Sun, Jianxin Liao:
Grouping Synchronous to Eliminate Stragglers with Edge Computing in Distributed Deep Learning. 429-436 - Degan Zhang, Hong-rui Fan, Jie Zhang:
Novel Resource Allocation Algorithm of Edge Computing Based on Deep Reinforcement Learning Mechanism. 437-444 - Zhijun Wu, Cheng Liang, Yuqi Li:
Intrusion Detection Method based on Deep Learning. 445-452 - Yang Liang, Zhigang Hu, Liu Yang:
A Two-stage Replica Management Mechanism for Latency-Aware Applications in Multi-Access Edge Computing. 453-459 - Pengwei Wang, Yajun Zhao, Zhaohui Zhang:
Joint Optimization of Data Caching and Task Scheduling based on Information Entropy for Mobile Edge Computing. 460-467 - Tian Dong, Han Qiu, Jialiang Lu, Meikang Qiu, Chun Fan:
Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated Learning. 468-475 - Shili Yan, Bing Tang, Jincheng Luo, Xing Fu, Xiaoyuan Zhang:
Unsupervised Anomaly Detection with Variational Auto-Encoder and Local Outliers Factor for KPIs. 476-483 - Yingjun Ye, Yongdong Zhang, Weicai Ye:
An application-level failure detection algorithm based on a robust and efficient torus-tree for HPC. 484-492 - Chuanjia Hou, Tong Jia, Yifan Wu, Ying Li, Jing Han:
Diagnosing Performance Issues in Microservices with Heterogeneous Data Source. 493-500 - Zhongyang Wang, Yijie Wang, Zhenyu Huang, Yongjun Wang:
Entropy and Autoencoder-Based Outlier Detection in Mixed-Type Network Traffic Data. 501-508 - Jingxuan Kang, Bin Zang, Weipeng Cao:
Domain Adaptive Semantic Segmentation via Image Translation and Representation Alignment. 509-516 - Lingyao Chen, Kang Xu, Xiaoying Zheng, Yongxin Zhu, Yi Jing:
Image Distillation Based Screening for X-ray Crystallography Diffraction Images. 517-521 - Ziheng Zhou, Hong Guo, Yuwen Guo, Huanhuan Sheng:
Synthesis and Segmentation Method of Cross-Staining Style Nuclei Pathology Image Based on Adversarial Learning. 522-532 - Rui Miao, Hongxu Jiang, Fangzheng Tian, Xiaobin Li, Yonghua Zhang, Dong Dong:
Real-Time Ship detection from Infrared Images Through Multi-feature Fusion. 533-538 - Gang Qiu, Yanli Guo:
Movie Big Data Intelligent Recommendation System Based on Knowledge Graph. 539-546 - Jihe Wang, Hao Chen, Danghui Wang, Kuizhi Mei, Shengbing Zhang, Xiaoya Fan:
A Heterogeneous Stochastic Computing Multiplier for Universally Accurate and Energy-Efficient DNNs. 547-554 - Yu Han, Wei Hu, Jing Liu, Yu Gan:
Energy-Efficient Scheduling Algorithms with Reliability Goal on Heterogeneous Embedded Systems. 555-562 - Qinnan Qiu, Yongmei Lei, Dongxia Wang, Guozheng Wang:
An efficient hybrid MPI/OpenMP parallelization of the asynchronous ADMM algorithm. 563-570 - Suna He, Jigang Wu, Bing Wei, Jiaxin Wu:
Task Tree Partition and Subtree Allocation for Heterogeneous Multiprocessors. 571-577 - Hao Shi, Yixiang Chen, Jinyi Xu:
An Efficient Scheduling Algorithm for Distributed Heterogeneous Systems with Task Duplication Allowed. 578-587 - Jiong Zhang, Biao Wang, Hongjun Dai:
An Effective Outlier Detection Method for EAF Based on an Iterative Heterogeneous Ensemble. 588-593 - Qingyuan Jiang, Jinyi Xu, Yixiang Chen:
A Genetic Algorithm for Scheduling in Heterogeneous Multicore System Integrated with FPGA. 594-602 - Weiyu Tan, Tian Ling, Zhenyu Zeng, Ying Tao, Yuxia Cheng:
Learning Heterogeneous DAG Tasks Scheduling Policies With Efficient Neural Network Evolution. 603-610 - Hong Guo, Cui Hanjing:
An Edge Computing Architecture and Application Oriented to Distributed Microgrid. 611-617 - Yifan Liang, Hongjun Dai:
Application Virtualization: An Agent Encapsulation of Software in Virtual Machines to Archive the Execution Performance in Hosts. 618-625 - Zhijun Wu, Junjun Guo, Weihang Cui:
Analysis of BBR's Non-queuing Optimal Model. 626-631 - Jianfeng An, Hongjun You, Jinhua Sun, Jiawei Cao:
Fault Tolerant XY-YX Routing Algorithm Supporting Backtracking Strategy for NoC. 632-635 - Hong Guo, Guo Nan:
Research and Application of a Multidimensional Association Rules Mining Algorithm Based on Hadoop. 636-643 - Shuyu Wu, Linghe Kong, Qiao Xiang, Zhenzhe Zheng, Luoyi Fu, Guihai Chen:
A Lightweight, Privacy-Preserving Tensor Completion Framework for Internet of Things. 644-651 - Jiang Zhou, Lin Su, Weiping Wang, Yong Chen:
Hashing Based Data Distribution in Heterogeneous Storage. 652-659 - Tanhong Chen, Tao Ren, Jianwei Niu, Qingfeng Li:
A Novel Shape-based Robotic Sorting Approach based on Computer Vision. 660-667 - Yaqiong Ma, Xiangyu Bai, Zhaoran Wang:
Trajectory Privacy Protection Method based on Shadow vehicles. 668-673 - Ying Huang, Xiaoying Zheng, Yongxin Zhu, Xiangcong Kong, Xinru Jing:
CPU-GPU Collaborative Acceleration of Bulletproofs - A Zero-Knowledge Proof Algorithm. 674-680 - Jiayi Lai, Lin Gan, Lanning Wang:
Mixed-precision Methods to Reconstruct Numerical Ocean Simulations. 681-688 - Xiaoyun Dong, Zhenchao Ouyang, Zeling Guo, Jianwei Niu:
Polarmask-Tracker: Lightweight Multi-Object Tracking and Segmentation Model for Edge Device. 689-696 - Jinyu Wang, Yifei Kang, Yiwen Li, Weiguo Wu, Song Liu, Longxiang Wang:
Hexagonal Tiling based Multiple FPGAs Stencil Computation Acceleration and Optimization Methodology. 697-705 - Syeed Abrar Zaoad, Tauhid Tanjim, Mir Hasan, Md. Mamun-Or-Rashid, Ibrahem Abdullah Almansour, Md. Mosaddek Khan:
Accelerating Message Passing Operation of GDL-Based Constraint Optimization Algorithms Using Multiprocessing. 706-714 - Yuekai Zhao, Jianzhuang Lu, Xiaowen Chen:
Vectorized Winograd's algorithm for Convolution Neural networks. 715-722 - Lihua Song, Yuzhu Jin, Pengyu Wang, Dongchao Ma, Wenlong Chen, Laizhong Cui:
Multi-path Routing Deployment Method Based on SRv6. 723-730 - Shanshan Shi, Jun Li, Bin Han, Haibo Wu, Yuxiang Ma, Qian Dong, Hans D. Schotten:
Multi-Path Forwarding Strategy for Named Data Networking Based on Pending Interests and Available Bandwidth. 731-737 - Ying Zeng, Minghua Wang, Bo Fan:
Cooperative Charging Algorithm Based on K-mean++ Clustering for WRSN. 738-744 - Wentao Dong, Zhuo Li, Xin Chen:
Deep Reinforcement Learning-based Adaptive Clustering Approach in Short Video Sharing through D2D Communication. 745-752 - Xin Shen, Zhuo Li, Xin Chen:
Optimization for Node Cooperation in Hierarchical Federated Learning. 753-760 - Tingting Zhang, Mingqi Zhang, Lintao Yang, Tao Dong, Jie Yin, Zhihui Liu, Jing Wu, Hao Jiang:
Satellite Network Traffic Scheduling Algorithm Based on Multi-Agent Reinforcement Learning. 761-768 - Luis Herrera-Huisa, Nicole Arias-Meza, Michael Cabanillas-Carbonell:
Analysis of the use of Machine Learning in the detection and prediction of hypertension in COVID 19 patients. A review of the scientific literature. 769-775 - Shuyu Chen, Shiyong Sun, Haopeng Chen, Jinteng Ruan, Ziming Wang:
A Game Theoretic Approach to Task Offloading for Multi-Data-Source Tasks in Mobile Edge Computing. 776-784 - Yanrong Lu, Meng Yue, Zhijun Wu:
Content Security over ICN based Smart Grid: A Cryptographic Solution. 785-791 - Dawei Li, Yingxian Song, Lixin Zhang, Di Liu, Baoquan Ma, Zhenyu Guan:
Unified Authentication Scheme for IoT Blockchain Based on PUF. 792-798 - Zhenyu Guan, Xiaoqing Wen, Dawei Li, Mai Xu, Haihua Li:
A Blockchain-based Verified Locating Scheme for IoT Devices. 799-805 - Yongqing Zhu, Zhenyu Guan, Ziyi Wang, Dawei Li, Yawei Wang, Mai Xu:
SRAM-PUF Based Lightweight Mutual Authentication Scheme for IoT. 806-813 - Jiaofu Zhang, Lianzhong Liu, Zihang Huang, Lihua Han, Shuhai Wang, Tongge Xu, Jingyi Zhang, Yangyang Li, Yifeng Liu, Md. Zakirul Alam Bhuiyan:
Robust Social Event Detection via Deep Clustering. 814-819 - Linlin Liu, Minghua Wang, Yan Wang:
An Energy-balanced Routing by Considering Neighbor Node's Energy Based on Small World WSN. 820-825 - Liuhui Ding, Dachuan Li, Bowen Liu, Wenxing Lan, Bing Bai, Qi Hao, Weipeng Cao, Ke Pei:
Capture Uncertainties in Deep Neural Networks for Safe Operation of Autonomous Driving Vehicles. 826-835 - Xingshuo Han, Kangjie Chen, Yuan Zhou, Meikang Qiu, Chun Fan, Yang Liu, Tianwei Zhang:
A Unified Anomaly Detection Methodology for Lane-Following of Autonomous Driving Systems. 836-844 - Chen Zhao, Jiaqi Yin, Huibiao Zhu, Ran Li:
Modeling and Verifying Ticket-Based Authentication Scheme for IoT Using CSP. 845-852 - Pengfei Yue, Ru Li, Bin Pang:
The Random Content Poisoning Attack in NDN. 853-860 - Guoliang Yang, Mengqi Xiong, Guangsheng Feng, Yuzheng Liu, Yun Huang:
Distributed V2V Computing Offloading Method Based on Delay and Fairness Awareness. 861-867 - Feifei Liu, Di Liu, Yu Sun, Dawei Li, Jian Cui, Zhenyu Guan,